Mozilla Firefox/Thunderbird/Seamonkey is prone to multiple
vulnerabilities.
# SPDX-FileCopyrightText: 2013 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.803204");
script_version("2023-07-27T05:05:08+0000");
script_cve_id("CVE-2013-0764", "CVE-2013-0768", "CVE-2013-0757", "CVE-2013-0745",
"CVE-2013-0747", "CVE-2013-0752", "CVE-2013-0755", "CVE-2013-0756");
script_tag(name:"cvss_base", value:"9.3");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:C/I:C/A:C");
script_tag(name:"last_modification", value:"2023-07-27 05:05:08 +0000 (Thu, 27 Jul 2023)");
script_tag(name:"creation_date", value:"2013-01-16 16:41:34 +0530 (Wed, 16 Jan 2013)");
script_name("Mozilla Products Multiple Vulnerabilities-04 (Jan 2013) - Windows");
script_xref(name:"URL", value:"http://secunia.com/advisories/51752/");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/57204");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/57211");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/57213");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/57215");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/57236");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/57240");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/57241");
script_xref(name:"URL", value:"http://securitytracker.com/id?1027955");
script_xref(name:"URL", value:"http://securitytracker.com/id?1027957");
script_xref(name:"URL", value:"http://securitytracker.com/id?1027958");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2013/mfsa2013-03.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2013/mfsa2013-07.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2013/mfsa2013-08.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2013/mfsa2013-10.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2013/mfsa2013-13.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2013/mfsa2013-14.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2013/mfsa2013-18.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2013/mfsa2013-19.html");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2013 Greenbone AG");
script_family("General");
script_dependencies("gb_firefox_detect_portable_win.nasl", "gb_seamonkey_detect_win.nasl", "gb_thunderbird_detect_portable_win.nasl");
script_mandatory_keys("Mozilla/Firefox_or_Seamonkey_or_Thunderbird/Installed");
script_tag(name:"impact", value:"Successful exploitation could allow attackers to inject scripts,
bypass certain security restrictions, cause a denial of service or execute arbitrary code in the
context of the browser.");
script_tag(name:"affected", value:"- SeaMonkey version before 2.15
- Thunderbird version before 17.0.2
- Mozilla Firefox version before 18.0
- Thunderbird ESR version 17.x before 17.0.2
- Mozilla Firefox ESR version 17.x before 17.0.2");
script_tag(name:"insight", value:"- An error exists within the 'nsSOCKSSocketInfo::ConnectToProxy()'
when handling SSL connection threads.
- An error when parsing height and width values of a canvas element.
- An error within the 'Object.prototype.__proto__()' can be exploited to bypass Chrome Object
Wrappers (COW).
- Unspecified error in the browser engine can be exploited to corrupt memory.
- An error exists due to the AutoWrapperChanger class not keeping certain objects alive during
garbage collection.");
script_tag(name:"summary", value:"Mozilla Firefox/Thunderbird/Seamonkey is prone to multiple
vulnerabilities.");
script_tag(name:"solution", value:"Update to Mozilla Firefox version 18.0 or ESR version 17.0.2 or
later, update to SeaMonkey version to 2.15 or later, update to Thunderbird version to 17.0.2 or
ESR 17.0.2 or later.");
script_tag(name:"qod_type", value:"registry");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
include("version_func.inc");
vers = get_kb_item("Firefox/Win/Ver");
esrvers = get_kb_item("Firefox-ESR/Win/Ver");
if(vers || esrvers) {
if((vers && version_is_less(version:vers, test_version:"18.0")) ||
(esrvers && version_in_range(version:esrvers, test_version:"17.0", test_version2:"17.0.1"))) {
security_message( port: 0, data: "The target host was found to be vulnerable" );
exit(0);
}
}
vers = get_kb_item("Seamonkey/Win/Ver");
if(vers && version_is_less(version:vers, test_version:"2.15")) {
security_message( port: 0, data: "The target host was found to be vulnerable" );
exit(0);
}
vers = get_kb_item("Thunderbird/Win/Ver");
esrvers = get_kb_item("Thunderbird-ESR/Win/Ver");
if(vers || esrvers) {
if((vers && version_is_less(version:vers, test_version:"17.0.2")) ||
(esrvers && version_in_range(version:esrvers, test_version:"17.0", test_version2:"17.0.1"))) {
security_message( port: 0, data: "The target host was found to be vulnerable" );
exit(0);
}
}
exit(99);
secunia.com/advisories/51752/
securitytracker.com/id?1027955
securitytracker.com/id?1027957
securitytracker.com/id?1027958
www.mozilla.org/security/announce/2013/mfsa2013-03.html
www.mozilla.org/security/announce/2013/mfsa2013-07.html
www.mozilla.org/security/announce/2013/mfsa2013-08.html
www.mozilla.org/security/announce/2013/mfsa2013-10.html
www.mozilla.org/security/announce/2013/mfsa2013-13.html
www.mozilla.org/security/announce/2013/mfsa2013-14.html
www.mozilla.org/security/announce/2013/mfsa2013-18.html
www.mozilla.org/security/announce/2013/mfsa2013-19.html
www.securityfocus.com/bid/57204
www.securityfocus.com/bid/57211
www.securityfocus.com/bid/57213
www.securityfocus.com/bid/57215
www.securityfocus.com/bid/57236
www.securityfocus.com/bid/57240
www.securityfocus.com/bid/57241